Click here to download all references as Bib-File.•
2020-02-12
⋅
McAfee
⋅
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I FriedEx |
2020-02-12
⋅
VMWare Carbon Black
⋅
Ryuk Ransomware Technical Analysis Ryuk |
2020-02-12
⋅
Twitter (@DrStache_)
⋅
Tweet on ManaBotnet Azorult |
2020-02-12
⋅
MeltX0R Security
⋅
Goblin Panda APT: Recent infrastructure and RAT analysis NewCore RAT |
2020-02-12
⋅
Telsy
⋅
Meeting POWERBAND: The APT33 .NET POWERTON Variant POWERTON POWERBAND |
2020-02-12
⋅
Cisco Talos
⋅
Loda RAT Grows Up Loda |
2020-02-11
⋅
Twitter (@malwrhunterteam)
⋅
Tweet on Parallax RAT Parallax RAT |
2020-02-11
⋅
Github (jeFF0Falltrades)
⋅
Metamorfo (aka Casbaneiro) Metamorfo Unidentified 072 (Metamorfo Loader) |
2020-02-10
⋅
Bitdefender
⋅
Hypervisor Introspection Thwarts Web Memory Corruption Attack in the Wild coldbrew |
2020-02-10
⋅
viXra
⋅
A Case Study into solving Crypters/Packers in Malware Obfuscation using an SMT approach Locky |
2020-02-10
⋅
Kaspersky Labs
⋅
KBOT: sometimes they come back Bolek |
2020-02-10
⋅
Bit of Hex Blog
⋅
Suspected Sapphire Mushroom (APT-C-12) malicious LNK files Unidentified PS 001 APT-C-12 |
2020-02-10
⋅
Malwarebytes
⋅
2020 State of Malware Report magecart Emotet QakBot REvil Ryuk TrickBot WannaCryptor |
2020-02-10
⋅
ZDNet
⋅
FBI warns about ongoing attacks against software supply chain companies DistTrack Kwampirs |
2020-02-08
⋅
FireEye
⋅
Reversing the Gophe SPambot: Confronting COM Code and Surmounting STL Snags Gophe |
2020-02-08
⋅
MyCERT
⋅
MA-774.022020: MyCERT Advisory - Espionage Campaign Based On Technical Indicators APT40 |
2020-02-08
⋅
PICUS Security
⋅
Emotet Technical Analysis - Part 2 PowerShell Unveiled Emotet |
2020-02-07
⋅
Bleeping Computer
⋅
TA505 Hackers Behind Maastricht University Ransomware Attack Clop |
2020-02-07
⋅
Medium CSIS Techblog
⋅
InstallCapital — When AdWare Becomes Pay-per-Install Cyber-Crime DreamBot Glupteba |
2020-02-07
⋅
Medium Sebdraven
⋅
APT 40 in Malaysia DADJOKE |